KR20170001864A - System and method for verifying validity of digital image - Google Patents

System and method for verifying validity of digital image Download PDF

Info

Publication number
KR20170001864A
KR20170001864A KR1020150091173A KR20150091173A KR20170001864A KR 20170001864 A KR20170001864 A KR 20170001864A KR 1020150091173 A KR1020150091173 A KR 1020150091173A KR 20150091173 A KR20150091173 A KR 20150091173A KR 20170001864 A KR20170001864 A KR 20170001864A
Authority
KR
South Korea
Prior art keywords
digital image
portable terminal
information
verification information
photographed
Prior art date
Application number
KR1020150091173A
Other languages
Korean (ko)
Inventor
김동진
박경자
이진원
Original Assignee
주식회사 씽크풀
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 씽크풀 filed Critical 주식회사 씽크풀
Priority to KR1020150091173A priority Critical patent/KR20170001864A/en
Publication of KR20170001864A publication Critical patent/KR20170001864A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

Disclosed are a system and a method for verifying validity of a digital image to verify whether a digital image received from a portable terminal is an image photographed by the portable terminal. According to an aspect of the present invention, the system for verifying validity of the digital image is provided, which includes: an image receiving module for receiving a digital image from a portable terminal; an extracting module for extracting a first verifying information which is at least a part of meta data included in the received digital image; an obtaining module including information having a type same with that of information included in the first verifying information, and obtaining a second verifying information corresponding to the portable terminal; and a verifying module for verifying validity of the digital image by comparing the first verifying information with the second verifying information.

Description

[0001] SYSTEM AND METHOD FOR VALIDATION OF A DIGITAL IMAGE [0002]

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a digital image validation system and method, and more particularly, to a digital image validation system and method for verifying whether a digital image received from a portable terminal is an image captured by the portable terminal will be.

Recently, wired / wireless communication networks have been developed and various online services such as online commerce, internet banking, and online certificate issuance have been provided as computers and the Internet have become popular in homes. Because of the nature of these services, it is very important that they authenticate themselves to ensure that the user has the right to use the service.

It is the most authentic authentication method that the user himself or herself visits the bank or the certificate issuing institution. However, since the online service is very troublesome in terms of the nature of the online service, the user scans or photographs his or her ID card or facial photograph, Non-face authentication technologies are emerging in the certification body that perform identity verification through transmitted pictures. However, if the current non-face authentication technology is used, the image of the ID of the other person (the person to be hijacked) may be collected through an illegal route, and the abuse of the image may occur.

In addition, there are cases where the insurer of a car inspects the mileage or the installation of a black box and provides a service to discount the insurance premium. In such a case, there is a case where forged pictures are transmitted. Even if you do not have the goods, there are also cases where you try to steal photos of others and pretend that you have the goods.

As the number of cases of counterfeiting and theft of photographs is increasing, a method for preventing the counterfeiting or theft is widely required.

SUMMARY OF THE INVENTION Accordingly, the present invention has been made keeping in mind the above problems occurring in the prior art, and an object of the present invention is to provide a system and method for verifying that a photograph transmitted from a user's portable terminal is a photograph taken by the portable terminal, Method.

According to an aspect of the present invention, there is provided an image processing apparatus including an image receiving module that receives a digital image from a portable terminal, an extraction module that extracts first verification information that is at least a part of the metadata included in the received digital image, And a verification module for verifying the validity of the digital image by comparing the first verification information and the second verification information with an acquisition module for obtaining second verification information corresponding to the portable terminal A digital image validation system is provided.

In one embodiment, the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information on which the digital image was photographed, Wherein when the first verification information includes the location information of the place where the digital image is photographed, the second verification information includes the location information of the portable terminal, and the first verification information indicates the location of the digital image The second verification information includes identification information of the portable terminal, and when the first verification information includes time information on which the digital image was captured, And may include time information of receiving the digital image from the terminal.

In one embodiment, when the first verification information includes location information of a place where the digital image is photographed, the acquiring module acquires location information of the portable terminal from the portable terminal or a mobile communication terminal System, and when the first verification information includes identification information of a device that has photographed the digital image, identification information of the portable terminal can be received from the portable terminal or a mobile communication company system subscribed to by the portable terminal have.

In one embodiment, when the first verification information includes positional information of a place where the digital image is photographed, the verification module may determine that the position of the place where the digital image was photographed and the position of the portable terminal are located at a predetermined position And if the first verification information includes identification information of a device that has photographed the digital image, whether the identification information of the photographed device and the identification information of the portable terminal coincide with each other And when the first verification information includes the time information of the digital image taken, a time when the digital image was photographed and a time when the digital image was received from the portable terminal satisfy a predetermined time condition Can be determined.

In one embodiment, the digital image may be one of a facial image of the user of the portable terminal, an ID image, and an image of a unique authentication object, which is captured by the portable terminal.

In one embodiment, the digital image validation system may further comprise a personal authentication module that performs non-face-to-face authentication based on the digital image.

In one embodiment, the metadata included in the digital image is data encrypted with a predetermined encryption method for the purpose of preventing forgery and falsification, and the validity verification system of the digital image includes a step of encrypting the metadata The extraction module may extract the first verification information from the decrypted metadata.

According to another aspect of the present invention, there is provided an image processing method including the steps of receiving an image from a portable terminal, extracting first verification information that is at least a part of metadata included in the received digital image, A verification step of verifying the validity of the digital image by comparing the first verification information and the second verification information with each other, the obtaining step of obtaining second verification information corresponding to the portable terminal, A method for validating a digital image is provided.

In one embodiment, the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information on which the digital image was photographed, Wherein when the first verification information includes the location information of the place where the digital image is photographed, the second verification information includes the location information of the portable terminal, and the first verification information indicates the location of the digital image The second verification information includes identification information of the portable terminal, and when the first verification information includes time information on which the digital image was captured, And may include time information of receiving the digital image from the terminal.

In one embodiment, the acquiring step may include acquiring location information of the portable terminal when the first verification information includes location information of a place where the digital image is photographed, Wherein the first verification information includes identification information of a device that has photographed the digital image, the identification information of the portable terminal may be transmitted to the portable terminal or the mobile communication terminal From the base station.

In one embodiment, when the first verification information includes location information of a place where the digital image is photographed, the verification step may include a step of determining whether the position of the place where the digital image was photographed, Determining whether the condition is satisfied;

Determining whether the identification information of the device photographed with the digital image matches the identification information of the portable terminal when the first verification information includes the identification information of the device that photographed the digital image, And judging whether the time at which the digital image was photographed and the time at which the digital image was received from the portable terminal satisfy a predetermined time condition when the verification information includes time information of the digital image taken .

In one embodiment, the digital image may be one of a facial image of the user of the portable terminal, an ID image, and an image of a unique authentication object, which is captured by the portable terminal.

In one embodiment, the method for validating the digital image may further include a step of authenticating the user who performs non-face-to-face authentication based on the digital image.

In one embodiment, the metadata included in the digital image is data encrypted with a predetermined encryption method for the purpose of preventing forgery and falsification, and the method for verifying the validity of the digital image is a method of encrypting the metadata using the decryption method corresponding to the encryption method. And the extracting step may include extracting the first verification information from the decrypted metadata.

According to another aspect of the present invention, there is provided a computer program installed in a data processing apparatus and stored in a recording medium for performing the above-described method.

According to another aspect of the present invention there is provided a system for validating a digital image, the system comprising a processor and a memory storing a program, wherein the program, when executed by the processor, There is provided a digital image validation system for performing the above-described method.

According to an embodiment of the present invention, it is possible to provide a system and method for verifying that a photograph transmitted from a portable terminal of a user who intends to perform non-face-to-face authentication is a photograph taken by the portable terminal.

A system and method for validating a digital image according to an embodiment of the present invention may be used for non-face-to-face authentication. In this case, the digital image transmitted by the portable terminal may be a facial image or ID image of the user of the portable terminal photographed by the portable terminal, and the digital image may be used for non-face-to-face authentication. That is, the system for verifying the validity of the digital image verifies that the ID photo to be used for non-face-to-face authentication is a photo captured by the user's own portable terminal to be authenticated by the ID card, I can verify that the photo was taken, in other words, it was occupied by the person at the time of taking the ID card.

Also, according to an embodiment of the present invention, the metadata used for validity verification of a digital image is encrypted, inserted into a digital image, decrypted and extracted to extract metadata, thereby preventing forgery and alteration of metadata.

BRIEF DESCRIPTION OF THE DRAWINGS A brief description of each drawing is provided to more fully understand the drawings recited in the description of the invention.
FIG. 1 is a conceptual illustration of a digital image validation system according to an exemplary embodiment of the present invention. Referring to FIG.
2 is a flowchart illustrating a method for verifying the validity of a digital image according to an exemplary embodiment of the present invention.
3 is a block diagram illustrating a schematic configuration of a digital image validation system according to an exemplary embodiment of the present invention.
FIG. 4 is a flowchart illustrating a method for validating a digital image according to an exemplary embodiment of the present invention and a non-face authentication method using the same.

BRIEF DESCRIPTION OF THE DRAWINGS The present invention is capable of various modifications and various embodiments, and specific embodiments are illustrated in the drawings and described in detail in the detailed description. It is to be understood, however, that the invention is not to be limited to the specific embodiments, but includes all modifications, equivalents, and alternatives falling within the spirit and scope of the invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, the present invention will be described in detail with reference to the accompanying drawings.

The terms first, second, etc. may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.

The terminology used in this application is used only to describe a specific embodiment and is not intended to limit the invention. The singular expressions include plural expressions unless the context clearly dictates otherwise.

In this specification, the terms "comprises" or "having" and the like refer to the presence of stated features, integers, steps, operations, elements, components, or combinations thereof, But do not preclude the presence or addition of features, numbers, steps, operations, components, parts, or combinations thereof.

Also, in this specification, when any one element 'transmits' data to another element, the element may transmit the data directly to the other element, or may be transmitted through at least one other element And may transmit the data to the other component. Conversely, when one element 'directly transmits' data to another element, it means that the data is transmitted to the other element without passing through another element in the element.

Hereinafter, the present invention will be described in detail with reference to the embodiments of the present invention with reference to the accompanying drawings. Like reference symbols in the drawings denote like elements.

FIG. 1 is a conceptual illustration of a digital image validation system according to an exemplary embodiment of the present invention. Referring to FIG. Referring to FIG. 1, a digital image validation system 100 may be provided to implement a method for validating a digital image according to an exemplary embodiment of the present invention.

The digital image validation system 100 can receive a digital image from the portable terminal 200 and verify the validity of the digital image. Here, the fact that the digital image is valid may mean that the digital image is an image photographed by the portable terminal that transmitted the digital image.

For this, the digital image validation system 100 and the portable terminal 200 may be connected to each other through a wired / wireless network to transmit / receive various information and / or data necessary for the technical idea of the present invention.

Meanwhile, the digital image validation system 100 can extract first verification data, which is a part of the metadata included in the received digital image.

Metadata is structured data about data, and it is data that explains other data. In particular, the metadata of a digital image includes photograph information such as exposure, flash use, resolution, and photo size, information (device manufacturer, device identification, model name, etc.) of the device that captured the digital image, And geographical location information of the photographed place, as meta data.

A representative format for storing metadata of a digital image is, but not limited to, an EXchangeable Image File format (Exif).

In one embodiment, the digital image validation system 100 may include validation information of meta data included in the digital image, including location information of a place where the digital image was captured, identification information of a device that photographed the digital image, Or at least one of the time information in which the digital image was captured, as the first verification information.

Meanwhile, the digital image validation system 100 may acquire the second verification information.

The second verification information is the same kind of information corresponding to the first verification information, and may be information corresponding to the portable terminal.

The second verification information is the same kind of information as the first verification information. For example, if the first verification information is the location information, the second verification information may also be the location information, Information, device identification information, and time information, the second verification information may also include location information, device identification information, and time information.

Meanwhile, the digital image validation system 100 may receive at least a part of the second verification information from the portable terminal 200, and in some cases, 300). For example, the digital image validation system 100 may directly receive the location information of the mobile terminal 200 from the mobile terminal 200, and in some cases, The location information of the mobile terminal 200 collected by the mobile communication company system 300 may be received from the mobile communication company system 300.

The mobile communication company to which the mobile terminal 200 subscribes may mean a communication company that provides a voice communication network / data communication network for the mobile phone 200 to perform voice communication / data communication, The verification system 100 and the mobile communication company system 300 may be connected to each other through a wired / wireless network to transmit / receive various information and / or data necessary for the technical idea of the present invention.

According to an embodiment, the mobile phone 220 may be a computing device including a smart phone, a tablet PC, a PDA (Personal Digital Assistant), a wireless computing device including a handheld device having other wireless connection capabilities, Or a processing device connected to a modem.

2 is a flowchart briefly illustrating a method for verifying the validity of a digital image according to an exemplary embodiment of the present invention.

Referring to FIG. 2, the portable terminal 200 captures a picture (S100) and transmits it to the digital image validation system 100 (S110).

Then, the digital image validation system 100 may extract the first verification information from the metadata included in the photograph (S120).

Meanwhile, the digital image validation system 100 may include the same kind of information as the information included in the first verification information, and may acquire second verification information corresponding to the portable terminal 200. The digital image validation system 100 may acquire at least a part of the second verification information from the portable terminal 200 or the mobile communication company system 300 to which the portable terminal 200 subscribes.

The digital image validation system 100 may then verify the validity of the digital image by comparing the first validation information and the second validation information.

The digital image validation system and method as described above can be used for non-face-to-face authentication. In this case, the digital image transmitted by the portable terminal 200 may be a facial image or ID image of the user of the portable terminal photographed by the portable terminal, and the digital image may be used for non-face authentication. That is, the digital image validation system 100 verifies that the photograph of the ID card to be used for non-face-to-face authentication is a photograph taken by the user's own portable terminal to be authenticated by the ID card, It is possible to provide a technical idea that can be proved to be occupied.

FIG. 3 is a block diagram illustrating a schematic configuration of a digital image validation system 100 according to an exemplary embodiment of the present invention. Referring to FIG. 3, the digital image validation system 100 includes an image receiving module 110, an extraction module 120, an acquisition module 130, a verification module 140, a personal authentication module 150, And a decryption module 160, as shown in FIG. According to an embodiment of the present invention, some of the above-mentioned components may not necessarily correspond to the components necessary for implementation of the present invention, and in addition, the digital image validation system 0.0 > 100 < / RTI > may include more components. For example, the digital image validation system 100 may include other configurations (e.g., image receiving module 110, extraction module 120, (Not shown) that can control the functions and / or resources of the module 130, the verification module 140, the authentication module 150 and / or the decryption module 160, etc.) .

The digital image validation system 100 may include hardware resources and / or software necessary to implement the technical idea of the present invention, and it may mean one physical component or one device It does not mean anything. That is, the digital image validation system 100 may mean a logical combination of hardware and / or software provided to implement the technical idea of the present invention. If necessary, The present invention may be embodied as a set of logical structures for realizing the technical idea of the present invention. In addition, the digital image validation system 100 may mean a set of configurations separately implemented for each function or role for implementing the technical idea of the present invention. For example, the image receiving module 110, the extraction module 120, the acquisition module 130, the verification module 140, the authentication module 150 and / or the decryption module 160 may be connected to different physical devices Or may be located in the same physical device. According to an embodiment of the present invention, the image receiving module 110, the extraction module 120, the acquisition module 130, the verification module 140, the authentication module 150 and / The combination of software and / or hardware may also be located in different physical devices, and configurations located in different physical devices may be organically coupled to implement each of the modules.

In this specification, a module may mean a functional and structural combination of hardware for carrying out the technical idea of the present invention and software for driving the hardware. For example, the module may refer to a logical unit of a predetermined code and a hardware resource for executing the predetermined code, and it does not necessarily mean a physically connected code or a kind of hardware But can be easily deduced to the average expert in the field of the present invention.

The image receiving module 110 may receive a digital image from the portable terminal 200.

The portable terminal 200 and the digital image validation system 100 may be connected through a wired / wireless network (e.g., the Internet).

The extraction module 120 may extract first verification information that is at least a part of the metadata included in the received digital image.

The metadata may be included in the digital image and may be data regarding the digital image itself. As described above, the metadata of the digital image may be in Exif format, but is not limited thereto.

The extraction module 120 may extract only a part of the metadata of the digital image as the first verification data.

According to an embodiment, the first verification information may include at least one of position information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information when the digital image was photographed .

The location information may be Global Positioning System (GPS) information.

The identification information of the device may be unique identification information given to the device, and may be unique information that can specify the device, such as the serial number of the device.

The validation system 100 of the digital image verifies both the location information of the place where the digital image is photographed, the identification information of the photographed device or the time information of the photographed digital image, However, in some cases, only a part of them may be used for validation of a digital image.

Meanwhile, in one embodiment, the metadata included in the digital image may be data encrypted with a predetermined encryption method for preventing forgery and falsification.

In this case, the portable terminal 200 that has photographed the digital image may include a predetermined encryption device or encryption software for encrypting the metadata, and the digital image validation system 100 may correspond to the encryption method The extraction module 120 may extract the first verification information from the decrypted metadata. The extraction module 120 may extract the first verification information from the decrypted metadata.

The encryption / decryption method used in the digital image validation system 100 according to an exemplary embodiment of the present invention may be a scheme based on a public key infrastructure (PKI), but the present invention is not limited thereto. An encryption / decryption method can be used.

Meanwhile, the acquisition module 130 may acquire second verification information corresponding to the first verification information, which is the same kind of information.

The information corresponding to the portable terminal may mean information about the portable terminal collected by the portable terminal, received from the portable terminal, or collected by a predetermined system interlocked with the portable terminal. Meanwhile, since the information included in the second verification information includes the same kind of information as the information included in the first verification information, if the first verification information includes the location information of the place where the digital image was captured , The second verification information may include location information of the portable terminal, and when the first verification information includes identification information of a device that has photographed the digital image, And the second verification information may include time information of receiving the digital image from the portable terminal when the first verification information includes the time information on which the digital image was captured.

When the first verification information includes the location information of the place where the digital image is photographed, the acquiring module 120 acquires location information of the portable terminal 200 from the portable terminal 200 or the portable terminal 200 From the mobile communication company system 300. In the former case, the mobile terminal 200 may include a predetermined GPS module capable of acquiring its own position information, and acquires GPS information indicating its own position using the GPS module, and transmits the GPS information to the validity verification system (100). In the latter case, the mobile communication company system 300 may include a predetermined system for tracking and collecting the position of the mobile terminal 200.

When the first verification information includes the time information of the digital image, the acquisition module 120 determines that the digital image is a digital image because the transmission time is very short when the digital image is transmitted through the network. The time transmitted to the validation system 100 can be regarded as the time when the digital image is received from the portable terminal 200. [

If the first verification information includes the identification information of the device that photographed the digital image, the identification information of the portable terminal may be transmitted to the portable terminal 200 or the mobile communication company system 300).

The verification module 140 may verify the validity of the digital image by comparing the first verification information and the second verification information.

More specifically, when the first verification information includes the location information of the place where the digital image is photographed, the verification module 140 determines whether the location of the location where the digital image was photographed, It is possible to judge whether or not the condition is satisfied.

The fact that two positions satisfy a predetermined position condition may mean that the two positions correspond to a predefined positional relationship. For example, if the distance between the position of the place where the digital image is photographed and the position of the portable terminal is within a predetermined limit distance, the verification module 140 determines the position of the place where the digital image is photographed, It can be determined that the position satisfies the positional condition.

If the first verification information includes the identification information of the device that photographed the digital image, the verification module 140 determines whether the identification information of the photographed device and the identification information of the portable terminal match the digital image Can be determined.

If the first verification information includes the time information of the digital image taken, the verification module 140 determines that the time when the digital image was photographed and the time when the digital image was received from the portable terminal is a predetermined time condition Is satisfied.

The satisfaction of a predetermined time condition between two times can mean that the two positions correspond to a predefined time relationship. For example, when the difference between the time at which the digital image is captured and the time at which the digital image is received from the portable terminal is within a predefined limit period, the verification module 140 determines that the digital image is captured, It can be determined that the time when the digital image was received from the terminal satisfies the time condition.

When the position of the place where the digital image is photographed and the position of the portable terminal satisfy a predetermined positional condition, the verification module 140 determines whether the digital image is the identification information of the photographed device and the identification information of the portable terminal And judges that the digital image is valid when the digital image is photographed and / or the time when the digital image is photographed and the time when the digital image is received from the portable terminal satisfies a predetermined time condition.

Meanwhile, the digital image may be any one of a facial image of the user of the portable terminal, an ID image, and a unique authentication object (IC card, OTP device, security card) captured by the portable terminal. In this case, Can be used for non-confidential self-certification.

Here, the unique authentication object may be an IC card, an OTP device, a security card, a credit card, or the like, which may be various objects or devices that can be used for authentication of the owner.

According to an embodiment, the digital image validation system 100 can perform non-face-to-face authentication, and for this purpose, the digital image validation system 100 performs non-face-to-face authentication based on the digital image The authentication module 150 may further include an authentication module 150 for authenticating the user.

When the digital image is an ID image, the identity authentication module 150 acquires information (e.g., a resident registration number, an address, a name, and a sex) necessary for authentication from the ID image through optical character recognition (OCR) Etc.), and in some cases, the identification photograph included in the ID image may be extracted. Then, the identity authentication module 150 can perform non-face-to-face authentication by comparing the read information and / or the identity photograph with the previously stored identity information.

When the digital image is an image of a unique authentication object, the digital image includes predetermined information (e.g., unique serial number of the IC card, unique serial number of the OTP device, unique serial number of the secure card, The card number of the credit card, and the expiration date) may be included in the digital image, and the identity authentication module 150 may acquire information (for example, IC The unique serial number of the card, the unique serial number of the OTP device, the unique serial number of the secure card, the card number of the credit card, and the expiration date).

FIG. 4 is a flowchart illustrating a method for validating a digital image according to an exemplary embodiment of the present invention and a non-face authentication method using the same.

Referring to FIG. 4, the portable terminal 200 captures an ID image P (S200) and transmits it to the validity verification system 100 of the digital image (S210).

Then, the digital image validation system 100 may extract the first verification information, which is at least a part of the metadata included in the received ID image (S220).

The first verification information may include location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, and / or time information when the digital image was photographed.

Accordingly, the digital image validation system 100 may extract positional information VP1 of a place where the digital image is photographed, identification information VI1 of a device that photographed the digital image from metadata included in the received ID image, , And / or time information (VT1) from which the digital image was photographed.

Meanwhile, the digital image validation system 100 may include the same type of information as the information included in the first verification information, and may acquire second verification information corresponding to the portable terminal.

More specifically, the digital image validation system 100 may obtain the time information VT2 of the portable terminal 200 transmitting the ID picture (S230). The digital image validation system 100 may receive the location information of the portable terminal from the portable terminal 200 or the mobile communication company 300 to which the portable terminal 200 has subscribed in step S231, The identification information of the portable terminal can be received from the portable terminal 200 or the mobile communication company system 300 to which the portable terminal 200 has subscribed in step S232.

Then, the digital image validation system 100 determines whether the location VP1 of the location where the digital image was captured and the location VP2 of the portable terminal satisfy a predetermined location condition, (VT1) at which the digital image is photographed and a time (VT2) at which the digital image was received from the portable terminal, the method comprising: determining whether the photographed apparatus identification information (VI1) (Step S240). In step S240, the validity of the ID picture is verified.

If it is determined that the ID image is valid, the digital image validation system 100 can perform the non-face authentication based on the ID image (S250).

Meanwhile, the digital image validity verification system 100 according to the technical idea of the present invention is not limited to the non-face-person self-certification, and the digital image validity verification system 100 according to the technical idea of the present invention is not limited thereto. And can be employed in various services or systems that need to prevent counterfeiting or forgery. For example, a system of an automobile insurance company that provides a service that checks the mileage or black box installation and provides discounts on insurance premiums, or even if you do not have the goods to be sold at the time of sale of the used goods, A digital image validation system 100 according to the technical idea of the present invention can be applied to a used goods trading system for preventing a case in which the user himself pretends to possess the object.

Meanwhile, according to an embodiment, the digital image validation system 100 may include a processor and a memory for storing a program executed by the processor. The processor may include a single-core CPU or a multi-core CPU. The memory may include high speed random access memory and may include non-volatile memory such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid state memory devices. Access to the memory by the processor and other components can be controlled by the memory controller. Here, when the program is executed by a processor, the program may cause the digital image validation system 100 according to the present embodiment to perform the above-described digital image validity verification method.

Meanwhile, the authentication method according to the embodiment of the present invention can be implemented in a computer-readable program command form and stored in a computer-readable recording medium. The control program and the target program according to the embodiment of the present invention And can be stored in a computer-readable recording medium. A computer-readable recording medium includes all kinds of recording apparatuses in which data that can be read by a computer system is stored.

Program instructions to be recorded on a recording medium may be those specially designed and constructed for the present invention or may be available to those skilled in the art of software.

Examples of the computer-readable recording medium include magnetic media such as a hard disk, a floppy disk and a magnetic tape, optical media such as CD-ROM and DVD, a floptical disk, And hardware devices that are specially configured to store and execute program instructions such as magneto-optical media and ROM, RAM, flash memory, and the like. The above-mentioned medium may also be a transmission medium such as a light or metal wire, wave guide, etc., including a carrier wave for transmitting a signal designating a program command, a data structure and the like. The computer readable recording medium may also be distributed over a networked computer system so that computer readable code can be stored and executed in a distributed manner.

Examples of program instructions include machine language code such as those produced by a compiler, as well as devices for processing information electronically using an interpreter or the like, for example, a high-level language code that can be executed by a computer.

The hardware devices described above may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.

It will be understood by those skilled in the art that the foregoing description of the present invention is for illustrative purposes only and that those of ordinary skill in the art can readily understand that various changes and modifications may be made without departing from the spirit or essential characteristics of the present invention. will be. It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. For example, each component described as a single entity may be distributed and implemented, and components described as being distributed may also be implemented in a combined form.

It is intended that the present invention covers the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents. .

Claims (16)

An image receiving module for receiving a digital image from a portable terminal;
An extracting module for extracting first verification information that is at least a part of metadata included in the received digital image;
An acquiring module that acquires second verification information corresponding to the first verification information, the second verification information corresponding to the first verification information; And
And a verification module for comparing the first verification information and the second verification information to verify the validity of the digital image.
The method according to claim 1,
Wherein the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information when the digital image was photographed,
When the first verification information includes position information of a place where the digital image is captured, the second verification information includes position information of the portable terminal,
Wherein when the first verification information includes identification information of a device that has captured the digital image, the second verification information includes identification information of the portable terminal,
Wherein the second verification information includes time information indicating that the digital image has been received from the portable terminal when the first verification information includes time information on the digital image taken.
3. The method of claim 2,
The acquisition module,
Receiving the location information of the portable terminal from the portable terminal or a mobile communication company system subscribed to by the portable terminal when the first verification information includes the location information of the place where the digital image is photographed,
Wherein the first verification information includes identification information of a device that has photographed the digital image, a validity verification system for digital image that receives the identification information of the portable terminal from the mobile terminal or the mobile communication company subscription system of the portable terminal .
3. The method of claim 2,
Wherein the verification module comprises:
Determining whether a position of the place where the digital image is photographed and a position of the portable terminal satisfy a predetermined positional condition when the first verification information includes positional information of a place where the digital image is photographed,
Determining whether the identification information of the device photographed with the digital image matches the identification information of the portable terminal when the first verification information includes the identification information of the device that photographed the digital image,
Wherein the first verification information includes time information on the time when the digital image is captured and a digital value that determines whether a time when the digital image was captured and a time when the digital image was received from the portable terminal satisfies a predetermined time condition, Image validation system.
The method according to claim 1,
Wherein the digital image is any one of a facial image of the user of the portable terminal, an ID image, and an image of a unique authentication object, which is captured by the portable terminal.
6. The method of claim 5,
Wherein the digital image validation system comprises:
And a personal authentication module for performing non-face-to-face authentication based on the digital image.
The method according to claim 1,
Wherein the metadata included in the digital image is data encrypted with a predetermined encryption method for forgery prevention,
Wherein the digital image validation system comprises:
And a decryption module for decrypting the metadata using a decryption method corresponding to the encryption method,
Wherein the extraction module comprises:
And extracting the first verification information from the decrypted metadata.
An image receiving step of receiving a digital image from a portable terminal;
An extraction step of extracting first verification information which is at least a part of metadata received from the received digital image;
An acquisition step of acquiring second verification information corresponding to the first verification information, the second verification information corresponding to the same kind of information corresponding to the first verification information; And
And verifying the validity of the digital image by comparing the first verification information and the second verification information.
9. The method of claim 8,
Wherein the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information when the digital image was photographed,
When the first verification information includes position information of a place where the digital image is captured, the second verification information includes position information of the portable terminal,
Wherein when the first verification information includes identification information of a device that has captured the digital image, the second verification information includes identification information of the portable terminal,
Wherein the second verification information includes time information of the digital image received from the portable terminal when the first verification information includes time information on the digital image taken.
10. The method of claim 9,
The acquiring step includes:
Receiving the location information of the portable terminal from the portable terminal or a mobile communication company system subscribed to by the portable terminal when the first verification information includes location information of a place where the digital image is photographed,
And receiving the identification information of the portable terminal from a mobile communication company system subscribed to by the portable terminal or the portable terminal when the first verification information includes identification information of the device that photographed the digital image, .
10. The method of claim 9,
Wherein the verifying step comprises:
Determining whether a position of a place where the digital image is photographed and a position of the portable terminal satisfy a predetermined positional condition when the first verification information includes positional information of a place where the digital image is photographed;
Determining whether the identification information of the device photographed with the digital image matches the identification information of the portable terminal when the first verification information includes the identification information of the device that photographed the digital image; And
Determining whether the time at which the digital image was captured and the time at which the digital image was received from the portable terminal satisfy a predetermined time condition when the first verification information includes time information of the digital image taken; The method comprising the steps of:
9. The method of claim 8,
Wherein the digital image is any one of a facial image of the user of the portable terminal, an ID image, and an image of a unique authentication object, which is captured by the portable terminal.
13. The method of claim 12,
A method of validating a digital image,
And authenticating the non-face person based on the digital image.
9. The method of claim 8,
Wherein the metadata included in the digital image is data encrypted with a predetermined encryption method for forgery prevention,
A method of validating a digital image,
Further comprising a decoding step of decoding the metadata by a decoding method corresponding to the encryption method,
Wherein the extracting step comprises:
And extracting the first verification information from the decrypted metadata.
A computer program installed in a data processing apparatus and stored in a recording medium for performing the method according to any one of claims 8 to 14.
A digital image validation system comprising:
A processor;
And a memory storing the program, wherein the program, when executed by the processor, causes the digital image validation system to perform the method according to any one of claims 8 to 14, Validation system.
KR1020150091173A 2015-06-26 2015-06-26 System and method for verifying validity of digital image KR20170001864A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150091173A KR20170001864A (en) 2015-06-26 2015-06-26 System and method for verifying validity of digital image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150091173A KR20170001864A (en) 2015-06-26 2015-06-26 System and method for verifying validity of digital image

Publications (1)

Publication Number Publication Date
KR20170001864A true KR20170001864A (en) 2017-01-05

Family

ID=57835592

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150091173A KR20170001864A (en) 2015-06-26 2015-06-26 System and method for verifying validity of digital image

Country Status (1)

Country Link
KR (1) KR20170001864A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20200020457A (en) * 2018-08-17 2020-02-26 네이버 주식회사 Method and system for providing reward based on follow and review information for list of point of interest
KR20200047504A (en) * 2020-04-28 2020-05-07 네이버 주식회사 Method and system for providing reward based on follow and review information for list of point of interest
KR20200062158A (en) * 2018-09-12 2020-06-03 네이버 주식회사 Method and system for filtering image using point of interest
KR20210033957A (en) * 2020-04-28 2021-03-29 네이버 주식회사 Method and system for providing reward based on follow and review information for list of point of interest
KR102568698B1 (en) * 2022-07-13 2023-08-22 한국전자기술연구원 UAV-based image file/transmission validation system and method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20200020457A (en) * 2018-08-17 2020-02-26 네이버 주식회사 Method and system for providing reward based on follow and review information for list of point of interest
KR20200062158A (en) * 2018-09-12 2020-06-03 네이버 주식회사 Method and system for filtering image using point of interest
KR20200047504A (en) * 2020-04-28 2020-05-07 네이버 주식회사 Method and system for providing reward based on follow and review information for list of point of interest
KR20210033957A (en) * 2020-04-28 2021-03-29 네이버 주식회사 Method and system for providing reward based on follow and review information for list of point of interest
KR102568698B1 (en) * 2022-07-13 2023-08-22 한국전자기술연구원 UAV-based image file/transmission validation system and method
WO2024014615A1 (en) * 2022-07-13 2024-01-18 한국전자기술연구원 Image file/transmission validity verification system and method based on unmanned aerial vehicle

Similar Documents

Publication Publication Date Title
KR101703712B1 (en) System and method for verifying validity of digital image taken by mobile terminal
JP7240030B2 (en) Identity authentication method, device and server
US11562363B2 (en) Hardware and token based user authentication
US20220417739A1 (en) Secure data communication
US10320807B2 (en) Systems and methods relating to the authenticity and verification of photographic identity documents
AU2010282394B2 (en) An intelligent peripheral device and system for the authentication and verification of individuals and/ or documents through a secure multifunctional authentication service with data storage capability
AU2018348549B2 (en) Authentication of a person using a virtual identity card
KR20170001864A (en) System and method for verifying validity of digital image
US10990776B2 (en) Methods and devices for biometric verification
US20160196509A1 (en) Ticket authorisation
KR101748136B1 (en) Method for certification using digital image, application system, and authentication system thereof
KR20170018127A (en) Method for certification using digital image, application system, and authentication system thereof
JP6690686B2 (en) Account opening system, account opening method, and program
KR20170017190A (en) Apparatus for verifying biometric information and mobile authentication and payment method using thereof
KR20170121737A (en) Method for Providing Non-Facing Certification by using Camera
KR100886410B1 (en) Authentication system and method using a time-varying code
Reagan et al. Identity Management for Large e-Government Populations.